Major weakness of key distribution using kdc


Question1. Give three instances of physiological or behavioural traits which can be employed for biometrics.

Question2. Provide two reasons why biometrics is not as popular as password based systems.

Question3. Suppose two entities A and B want to communicate securely using symmetric encryption. Describe how secure key distribution can be accomplished by using a trusted key distribution centre (KDC).

Question4. What is the major weakness of key distribution using KDC? List 2 ways how this can be overcome.

Question5. Provide two examples of modern block cipher other than DES.

Question6. Digital signature provides non-repudiation. Describe how this is done.

Question7. Give one instance of a MAC algorithm and one instance of a hash function.

Request for Solution File

Ask an Expert for Answer!!
Software Engineering: Major weakness of key distribution using kdc
Reference No:- TGS07252

Expected delivery within 24 Hours